Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 15:37

General

  • Target

    afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    afce39fc95e0c21846a96202c99b3662

  • SHA1

    94c496612ca2c10f0b1e9fb71ae2192599cd19c9

  • SHA256

    8354220de9015fb535e01a03467999fe02c4596df21eb72690d2fcd7bdb3ade2

  • SHA512

    1e8dda30ec957b575807cfd5fec4b803acf3a8d2daded4a2ff488dfa42f5d4e9bb0c2f0055056ba78236dc163b262a6b6ad0c2f0ec1f58d9ee107c2caa2b51c5

  • SSDEEP

    1536:si1Zyiu8FIIKZrDJxtJu9uRiIelOQ212IE6jDSUaWpsE4BjP4YTysOkt5ycQg:zZy8Q89uRvsW6EqysOyLX

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\afce39fc95e0c21846a96202c99b3662_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\gucuk.exe
      "C:\Users\Admin\gucuk.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\gucuk.exe

          Filesize

          132KB

          MD5

          036223eacc9b09bc7ae0eff0cd96250c

          SHA1

          5216c3bd785bc4869a2d72a0d0e4f5aa899beb7e

          SHA256

          5b4ae1a997d08d7c52453b047dff87f8686c0dea72e5df219e9488886eb3ca2f

          SHA512

          a87191385d6bb011800e479e836e4ca39951f948615f0ba7aa583a21ad91330e4a11083e06a069021e54f662d0aed6a97b1c58d7de8d40b6f65efc4835e2369f